Articles2022-02-02T13:20:51-08:00

Resource Library

Make sure your organization is prepared

Cybercriminal recruitment, House of Representatives Debate Cybersecurity, Attackers Sale Internet Bandwidth, Dropper-as-a-Service Attacks, Insight into the Conti ransomware

By |Categories: IT-Security Trends, News|Tags: |

1.  Cybercriminals Recruit English Speakers for Business Email Compromise Administrative and technical security controls have helped to reduce the effects of business email compromise (BEC). However, as a result, some BEC threat actors struggle to ...

Printer Vulnerability CVE-2021-3438, China Attacks Microsoft, Pulse Secure VPN Cyberattack, Pegasus Spyware Compromised, Kaseya Ransomware Decryption Key

By |Categories: IT-Security Trends, News|Tags: |

1.  A 16-year-old Printer Vulnerability CVE-2021-3438 (CVSS score: 8.8) Impacts Millions of Infrastructures A 16-year-old vulnerability was discovered in popular corporate printers that allow hackers to gain administrative rights to perform several activities on systems, including ...

Double Ransomware Attacks, Carnival Cruise’s Data Breach, REvil Compromises U.S. Nuclear Weapons Contractor, CVS Gets Hacked, G7 Cracks Down On Russia

By |Categories: IT-Security Trends, News|Tags: |

1.  After Paying Off The First Ransomware Demand, Most Firms Face A Second Ransomware Attack Security experts discovered that ransomware attackers deploy secondary ransomware attacks against firms that pay off initial ransom demands. After paying ...

Antivirus Softwares Vulnerable to ‘Cut and Mouse’, JBS Foods Cyber-Attack, Ransomware Hinders Criminal Prosecutions, US Supreme Court Restricts CFAA, US Nuclear Bunker Secrets Discovered

By |Categories: IT-Security Trends, News|Tags: |

1.  Security researchers reveal stealthy techniques to bypass antivirus tools and ransomware defenses Security researchers discovered significant vulnerabilities in popular antivirus tools, which could be exploited to deactivate protective mechanisms to launch ransomware attacks and ...

Colonial Pipeline ransomware attack fallout, President Biden’s executive cybersecurity order, triple extortion, Truist Bank spear-phishing campaign, AXA Insurance becomes victim

By |Categories: IT-Security Trends, News, Ransomware Attack|Tags: |

1.  Congress introduced two bills in the wake of the Colonial Pipeline ransomware attack Following the recent ransomware attack against Colonial Pipeline, which caused gas shortages in several states, the U.S. Congress introduced two bipartisan ...

Go to Top